mirror of
https://github.com/sickcodes/Docker-OSX.git
synced 2026-01-14 07:33:30 +01:00
Another gtk initialization failed ubuntu 20 #484
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @89jd on GitHub (Mar 15, 2023).
OS related issued, please help us identify the issue by posting the output of this
xhost +
@89jd commented on GitHub (Mar 16, 2023):
Running this cmd
Also if I run the command, without -v and -e for headless interestingly
@sickcodes commented on GitHub (May 7, 2023):
Add yourself to docker group and restart the docker daemon
@89jd commented on GitHub (May 7, 2023):
Thanks for response.
I am already added to docker group
@89jd commented on GitHub (May 7, 2023):
@bphd commented on GitHub (Jun 28, 2023):
To mitigate these security risks, follow these best practices for X server access control:
Identify and Whitelist Trusted Hosts: Take the time to identify the specific hosts that require access to your X server. Consider the purpose and requirements of each host in your network. This could include trusted workstations, servers, or other devices that need to run X applications or access the graphical interface. By carefully evaluating and identifying these hosts, you can create a list of authorized entities.
Whitelist Only Authorized Hosts: Once you have identified the trusted hosts, whitelist them by configuring the access control settings of the X server. Use commands such as "xhost +hostname" or "xhost +SI:localuser:username@hostname" to allow only these authorized hosts to connect to the X server. This effectively restricts access to the X server to the specified entities, preventing unauthorized connections.